Cadmium oxide thin films were synthesized by spray pyrolysis technique using perfume atomizer at different substrate temperature on (225, 275, 325 and 375 degree C) glass substrates. Effect of ...substrate temperature on the growth mechanism and physical properties of the films was investigated in order to find the suitability of them towards optical device applications. All the films were polycrystalline in nature having cubic structure with a preferential orientation along the (1 1 1) plane irrespective of the substrate temperature. Film transparency increases from 78% to 89% with increase in substrate temperature. Optical band gap decreases from 2.55eV to 2.38 eV with increase in substrate temperature. The refractive index dispersion of the films obeys the single oscillator model. The dispersion parameters, oscillator and dispersion energy of the films were calculated to analyze their choice in designing optical devices. A minimum resistivity of 3.57x10 super( -4) Omega cm was obtained for the film coated at 375 degree C.
ECG Denoising Using Multiple Approaches BM, Manjula; R, Vivek; R, Nishant ...
2023 International Conference on Data Science and Network Security (ICDSNS),
2023-July-28
Conference Proceeding
Today, heart diseases and cardiac-affiliated failures are one of the main causes of people losing their lives in the world. Cardiovascular diseases (CVDs) are a classification of diseases that deals ...with the heart and blood vessels. Electrocardiogram (ECG/EKG) is an efficient and a non-intrusive index for the classification, prevention, and detection of arrhythmia. These signals are contaminated by various noises like Muscle Artifact, Baseline Wander, Power Line Interference (PLI), etc., which may lead to wrong interpretations about the patient's condition and will affect the diagnosis and monitoring. Therefore, ECG denoising is one of the major pre-processing steps for the attenuation of these noises. In the proposed work, five different techniques namely a Denoising Autoencoder (DAE) Discrete Wavelet Transform (DWT), Butterworth Filter, FIR Filter, and Median Filter. The denoising performance is estimated using RMSE and SNR. The above-mentioned techniques are compared, analyzed and results show that the proposed Denoising Autoencoder performs better in terms of SNR and RMSE and is more efficient.
In this paper, we investigate an application of the Chinese Remainder Theorem (CRT) for a novel privacy preserving routing technique in wireless sensor networks (WSNs). The distinctive nature of the ...proposed technique is gathering the data, aggregating and then slicing the aggregate using t-out-of-n secret sharing scheme (based on CRT) and then route the packets to the sink via multiple paths. The sink will recover the final aggregate with just t shares using CRT. The multi-objective of the proposed technique is to provide data privacy, identity privacy, source location privacy, and route privacy. The solution also mitigates the problem of packet losses associated with the unreliable wireless communication medium by improving the reliability. We also propose an enhanced privacy preserving routing technique that achieves network wide routing paths, and overcomes the drawback of existing phantom single-path routing (PSPR) and forward random walk-based routing (FRW) schemes. Finally, we present the details of the proposed technique with a numerical example and give its possible application for secret and dynamic routing in WSNs. We also show the simulation results to validate the proposed method and comparison with PSPR and FRW techniques demonstrates that our scheme outperforms the other two solutions.
Spectral clustering and Leader's algorithm have both been used to identify clusters that are nonlinearly separable in input space. Despite significant research, these methods have remained only ...loosely related. Sigmoid kernel and polynomial kernel were quite popular for support vector machines due to its origin from clustering. In this paper we are submitting the comparison of above kernel methods after reducing the dimensions using feature functions. For this we have given hand writing data-sets to create and compare the clusters.
Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) ...attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques.
Glycoconjugate molecules expressed at the plasma membrane of mammalian cells have been reported to be associated with tumor progression. The measurement of total sialic acid (TSA) and lipid-bound ...sialic acid (LBSA) in the cerebrospinal fluid (CSF) is suggested to be useful for the diagnosis of brain tumors. But there are very few reports available on the serum glycoconjugate levels in patients with brain tumors.
The objective of this study is to check the feasibility of using serum glycoconjugates such as TSA and LBSA as tumor markers in brain tumor patients.
Colorimetric estimation of TSA using diphenylamine was done on 100 patients with intracranial tumors; follow-up study was carried out in 24 cases. The LBSA fraction was isolated from the serum of 68 brain tumor patients and evaluated using phosphotungstic acid and resorcinol; follow-up study was done on 23 patients. The various types of brain tumors included in this study were glioma, meningioma, and acoustic neurinoma as well as some other types such as medulloblastoma, secondary tumors, and craniopharyngioma.
There was no significant difference between the TSA and LBSA concentrations seen in pretreatment or post-treatment cases and that seen in control subjects.
TSA and LBSA do not have the ability to discriminate between benign and malignant brain tumors. TSA and LBSA appear to be tumor markers of very limited value in patients with brain tumors.
Detecting Original Image Using Histogram, DFT and SVM Devi, T H Manjula; Reddy, H S Manjunatha; Raja, K B ...
International Journal of Recent Trends in Engineering,
05/2009, Letnik:
1, Številka:
1
Journal Article
The urinary 6-hydroxymethylpterin(Pt-6-CH2OH) excretion was determined in 87 patients with brain tumours and in 50 control patients. The Pt-6-CH2OH levels were significantly elevated in all patients ...with tumours. No difference was observed when malignant tumours were compared with benign neoplasms. Following therapy, the Pt-6-CH2OH levels were partially reduced when compared with control patients and their pre-operative values.
Elevated urinary levels of modified nucleosides, especially pseudouridine (Ψ), have been observed in patients with a variety of malignant neoplasms. In this report, the urinary Ψ levels were ...estimated by high performance liquid chromatography in 93 patients with brain tumours and in 40 age and sex matched controls. The Y levels were found to be excreted in equal amounts in the control and the tumour groups. There was no significant difference in Y when patients with malignant diseases were compared with those with benign tumours. Following therapy, the Y levels remained unchanged when compared to the controls and their preoperative values. It is concluded that urinary Y concentration is not a useful marker for brain tumours.
In recent years, steganography and steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and ...secure information exchange is required. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image. Steganalysis is the technology that attempts to defeat steganography by detecting the hidden information and extracting. In this paper we propose an image steganography that can verify the reliability of the information being transmitted to the receiver. The method can verify whether the attacker has tried to edit, delete or forge the secret information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses two special AC coefficients of the discrete wavelet transform domain to verify the veracity (integrity) of the secret information from the stego image. The analysis shows that the BER and PSNR is improved in the case of DWT than DCT.